Answer:
Following are the code to this question:
def find_color(color):#definig a method find_color that accepts color parameter
color = str(color).replace('rgb(', '').replace(')', '')#definig color variable that convert parameter value in string and remove brackets
r, g, b = int(color.split(', ')[0]), int(color.split(', ')[1]), int(color.split(', ')[2])#defining r,g,b variable that splits and convert number value into integer
if r == g == b:#defining if block to check if r, g, b value is equal
return "gray"#return value gray
elif r > g and r > b:#defining elif block that checks value of r is greater then g and b
return "red"#return value red
elif b > g and b > r:#defining elif block that checks value of b is greater then g and r
return "blue"#return value blue
elif g > r and g > b:#defining elif block that checks value of g is greater then r and b
return "green"#return value green
elif r == g:#defining elif block that checks r is equal to g
return "yellow"#return value yellow
elif g == b:#defining elif block that checks g is equal to b
return "teal"#return value teal
elif r == b:#defining elif block that checks r is equal to b
return "purple"#return value purple
print(find_color("rgb(125, 50, 75)"))#using print method to call find_color method that accepts value and print its return value
print(find_color("rgb(125, 17, 125)"))#using print method to call find_color method that accepts value and print its return value
print(find_color("rgb(217, 217, 217)"))#using print method to call find_color method that accepts value and print its return value
Output:
red
purple
gray
Explanation:
In the above method "find_color" is declared that uses the color variable as the parameter, inside the method a color variable is declared that convert method parameter value into the string and remove its brackets, and three variable "r,g, and b" is defined. In this variable first, it splits parameter value and after that, it converts its value into an integer and uses the multiple conditional statements to return its calculated value.
if block checks the r, g, and b value it all value is equal it will return a string value, that is "gray" otherwise it will go to elif block. In this block, it checks the value of r is greater then g, and b if it is true it will return a string value, that is "red" otherwise it will go to another elif block. In this block, it checks the value of b is greater then g, and r if it is true it will return a string value, that is "blue" otherwise it will go to another elif block. In this block, it checks the value of g is greater then r and b if it is true it will return a string value, that is "green" otherwise it will go to another elif block. In the other block, it checks r is equal to g or g is equal to b or r is equal to b, it will return the value, that is "yellow" or "teal" or "purple".Your boss wants you to start making your own Ethernet cables to save the company money. What type of connectors will you need to order to make them?
Answer:
Bulk Ethernet Cable - Category 5e or CAT5e
Bulk RJ45 Crimpable Connectors for CAT-5e
Explanation:
ICMP
(a) is required to solve the NAT traversal problem
(b) is used in Traceroute
(c) has a new version for IPv6
(d) is used by Ping
Answer:
(b) is used in Traceroute
(d) is used by Ping
Explanation:
ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;
i. Requested service is not available
ii. Host could not be reached
ICMP does not use ports. Rather it uses types and codes. Some of the most common types are echo request and echo reply.
Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as Time Exceeded) to trace a network route.
Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP echo request packets to the host and then waits for an ICMP echo reply from the host.
ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.
What would be suggested way to share and sustain knowledge with members in a team ?
A) Sharing of best practices and lessons learnt through emails
B) Sharing knowledge through knowledge sharing sessions
C) Sharing knowledge through informal conversations, for example, during lunch breaks.
D) Sharing best practices, lessons learnt and other topics in a central place where team can collaborate
Answer: D) Sharing best practices, lessons learned and other topics in a central place where the team can collaborate
Explanation: Knowledge sharing within a team is usually an important aspect of building a strong and efficient team. Acquiring knowledge usually comes from the experience gathered from previous projects, learning, or tips learned from various sources. Therefore, sharing knowledge is always a good way to ensure that what is gained is sustained by letting others know. Sharing and sustaining knowledge is most effective when transmitted or aired to a group of people usually a team gathered in an interactive setting which allows members to freely share experience and get feedback, views, or thoughts from other collaborators.
k- Add the code to define a variable of type 'double', with the name 'cuboidVolume'. Calculate the volume of the cuboid and set this variable value.
Answer:
Here is the JAVA program to calculate volume of cuboid:
import java.util.Scanner; // Scanner class is used to take input from user
public class CuboidVol { // class to calculate volume of cuboid
public static void main(String[] args) { // start of main() function body
Scanner input= new Scanner(System.in); //create Scanner class object
// prompts user to enter length of cuboid
System.out.println("Enter the cuboid length:");
double length=input.nextDouble(); //reads the input length value from user
// prompts user to enter width of cuboid
System.out.println("Enter the cuboid width:");
double width=input.nextDouble(); //reads the input width from user
// prompts user to enter height of cuboid
System.out.println("Enter the cuboid height:");
double height=input.nextDouble(); //reads the input height from user
/* the following formula is to calculate volume of a cuboid by multiplying its length width and height and a double type variable cuboidVolume is defined to store the value of the resultant volume to it */
double cuboidVolume= length*width*height; //calculates cuboid volume
//displays volume of cuboid and result is displayed up to 2 decimal places
System.out.printf("Volume of the cuboid (length " + length + "/ height " + height + "/ width" +width +" is: " + "%.2f",cuboidVolume); } }
Explanation:
The formula for the volume of a cuboid is as following:
Volume = Length × Width × Height
So in order to calculate the volume of cuboid three variable are required for length, width and height and one more variable cuboidVolume to hold the resultant volume of the cuboid.
The program is well explained in the comments added to each statement of the program. The program prompts the user to enter the value of height width and length of cuboid and the nextDouble() method is used to take the double type input values of height length and width. Then the program declares a double type variable cuboidVolume to hold the result of the volume of cuboid. Then the last printf statement is used to display the volume of cuboid in the format format "Volume of the cuboid (length / height / width ) is" and the result is displayed up to 2 decimal places.
The screenshot of the program along with its output is attached.
Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require at least a paragraph for each type of firewall.
Acme Corporation wants to be sure employees surfing the web aren't victimized through drive-by downloads. Which type of firewall should Acme use? Explain why your answer is correct.
Answer:
packet filtering
Explanation:
We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D
Write a program that create Employee class with fields id,name and sal and create Employee object and store data and display that data.
Answer:
Here is the C++ program for Employee class with fields id,name and sal.
#include <iostream> // to use input output functions
#include <string> //to manipulate and use strings
using namespace std; // to access objects like cin cout
class Employee { //class Employee
private:
/* the following data members are declared as private which means they can only be accessed by the functions within Employee class */
string name; //name field
int id; //id field
double sal; //salary field
public:
Employee(); // constructor that initializes an object when it is created
/* setName, setID and setSalary are the mutators which are the methods used to change data members. This means they set the values of a private fields i.e. name, id and sal */
void setName(string n) //mutator for name field
{ name = n; }
void setId(int i) //mutator for id field
{ id = i; }
void setSalary(double d) //mutator for sal field
{ sal = d; }
/* getName, getID and getSalary are the accessors which are the methods used to read data members. This means they get or access the values of a private fields i.e. name, id and sal */
string getName() //accessor for name field
{ return name; }
int getId() //accessor for id field
{ return id; }
double getSalary() //accessor for sal field
{ return sal; } };
Employee::Employee() { //default constructor where the fields are initialized
name = ""; // name field initialized
id = 0; // id field initialized to 0
sal = 0; } // sal field initialized to 0
void display(Employee);
// prototype of the method display() to display the data of Employee
int main() { //start of the main() function body
Employee emp; //creates an object emp of Employee class
/*set the name field to Abc Xyz which means set the value of Employee class name field to Abc Xyz through setName() method and object emp */
emp.setName("Abc Xyz");
/*set the id field to 1234 which means set the value of Employee class id field to 1234 through setId() method and object emp */
emp.setId(1234);
/*set the sal field to 1000 which means set the value of Employee class sal field to 1000 through setSalary() method and object emp */
emp.setSalary(1000);
display(emp); } //calls display() method to display the Employee data
void display(Employee e) { // this method displays the data in the Employee //class object passed as a parameter.
/*displays the name of the Employee . This name is read or accessed through accessor method getName() and object e of Employee class */
cout << "Name: " << e.getName() << endl;
/*displays the id of the Employee . This id is read or accessed by accessor method getId() and object e */
cout << "ID: " << e.getId() << endl;
/*displays the salary of the Employee . This sal field is read or accessed by accessor method getSalary() and object e */
cout << "Salary: " << e.getSalary() << endl; }
Explanation:
The program is well explained in the comments mentioned with each statement of the program.
The program has a class Employee which has private data members id, name and sal, a simple default constructor Employee(), mutatator methods setName, setId and setSalary to set the fields, acccessor method getName, getId and getSalary to get the fields values.
A function display( ) is used to display the Employee data i.e. name id and salary of Employee.
main() has an object emp of Employee class in order to use data fields and access functions defined in Employee class.
The output of the program is:
Name: Abc Xyz
ID: 1234
Salary: 1000
The program and its output are attached.
A security analyst is performing a BIA. The analyst notes that in a disaster, failover systems must be up and running within 30 minutes. The failover systems must use back up data that is no older than one hour. Which of the following should the analyst include in the business continuity plan?
A. A maximum MTTR of 30 minutes
B. A maximum MTBF of 30 minutes
C. A maximum RTO of 60 minutes
D. An SLA guarantee of 60 minutes
Answer:
D. A maximum RPO of 60 minutes
Explanation:
Note that an option is not included in this list of options.
The complete list of options is:
A. A maximum MTTR of 30 minutes
B. A maximum MTBF of 30 minutes
C. A maximum RTO of 60 minutes
D. A maximum RPO of 60 minutes
E. An SLA guarantee of 60 minutes
The Recovery Point Objective tells how old a backup file must be before it can be recovered by a system after failure.
Since the data in the failover systems described in this question must be backup and recovered after the failure, it will be important to include the Recovery Point Objective (RPO) in the Business Continuity Plan.
Since the failover systems must use back up data that is no older than one hour, the backup of the system data must be done at intervals of 60 minutes or less. Meaning that the maximum RPO is 60 minutes.
Note that RPO is more critical than RTO in data backup
Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75).
Answer:
Following is the program in the python language
hr = input("input hours:") #Read input by user
h1 = float(hr)
rate =input("Input Rate:") #Read RATE BY USER
r1 = float(rate) #CONVERT INTO FLOAT
if h1 <= 40: #check condition
t=h1 * r1
print (t) #DISPLAY
else :#else block
t1=(40 * r1) + (h1 -40) * r1 * 1.5
print('The pay is :')
print(t1)#DISPLAY
Output:
input hours:45
Input Rate:10.50
The pay is :
498.75
Explanation:
Following are the description of program
Read the value of hour in the "hr" variable and convert into the float value in the "h1" variable .Read the value of rate in the " rate" variable and convert into the float value in the "r1" variable .After that check the condition of hour if block if the hour is less then or equal to 40 then it multiplied h1 *t1 otherwise else block will be executed and print the value of pay .
Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is entered.
Answer:
Here is the sentinel-controlled while loop:
#include <iostream> //to use input output functions
using namespace std; // to identify objects like cin cout
int main(){ // start of main() function body
int test_score; // declare an integer variable for test scores
//prompts user to enter test scores and type-99 to stop entering scores
cout << "Enter the test scores (enter -99 to stop): ";
cin >> test_score; // reads test scores from user
while (test_score != -99){ // while loop keeps executing until user enters -99
cin >> test_score; } } // keeps taking and reading test scores from user
Explanation:
while loop in the above chunk of code keeps taking input scores from user until -99 is entered. Sentinel-controlled loops keep repeating until a sentinel value is entered. This sentinel value indicates the end of the data entry such as here the sentinel value is -99 which stops the while loop from iterating and taking the test score input from user.
The complete question is that the code should then report how many scores were entered and the average of these scores. Do not count the end sentinel -99 as a score.
So the program that takes input scores and computes the number of scores entered and average of these scores is given below.
#include <iostream> // to use input output functions
using namespace std; // to identify objects like cin cout
int main(){ //start of main function body
double sum = 0.0; // declares sum variable to hold the sum of test scores
int test_score,count =0;
/* declares test_scores variable to hold the test scores entered by user and count variable to count how many test scores input by user */
cout << "Enter the test scores (or -99 to stop: ";
//prompts user to enter test scores and type-99 to stop entering scores
cin >> test_score; // reads test scores from user
while (test_score != -99){ // while loop keeps executing until user enters -99
count++; /* increments count variable each time a test cores is input by user to count the number of times user entered test scores */
sum = sum + test_score; // adds the test scores
cin >> test_score;} // reads test scores from user
if (count == 0) // if user enters no test score displays the following message
cout << "No score entered by the user" << endl;
else //if user enters test scores
//displays the numbers of times test scores are entered by user
cout<<"The number of test scores entered: "<<count;
/* displays average of test scores by dividing the sum of input test scores with the total number of input test scores */
cout << "\n The average of " << count << " test scores: " <<sum / count << endl;}
The program along with its output is attached.
4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think operating system designers would use the same interface for both
Answer:
According to the principles of design, Repetition refers to the recurrence of elements of the design
One of the advantages of this is that it affords uniformity. Another is that it keeps the user of such a system familiar or with the interface of the operating system.
One major drawback of this principle especially as used in the question is that it creates a familiar route for hackers.
Another drawback is that creates what is called "repetition blindness". This normally occurs with perceptual identification tasks.
The phenomenon may be due to a failure in sensory analysis to process the same shape, figures or objects.
Cheers!
(Find the index of the smallest element) Write a function that returns the index of the smallest element in a list of integers. If the number of such elements is greater than 1, return the smallest index. Use the following header: def indexOfSmallestElement(lst): Write a test program that prompts the user to enter a list of numbers, invokes this function to return the index of the smallest element, and displays the index.
Answer:
Here is the function that returns the the smallest element in a list of integers
def indexOfSmallestElement(lst):
smallest = lst.index(min(lst))
return smallest
Explanation:
The function indexOfSmallestElement() takes a list of integers lst as parameter.
smallest = lst.index(min(lst))
In the above statement two methods are used i.e. index() and min().
The first method index returns the index position of the list and the second method min() returns the minimum element of the list.
Now as a whole the statement min() first returns the smallest element in the list (lst) of integers and then the index() method returns the position of that minimum element of lst. At the end the index position of this smallest element in the list (lst) is stored in the smallest variable.
So lets say if we have a list of the following elements: [3,2,1,7,1,8] then min() returns the smallest element in this list i.e. 1 and index() returns the index position of this smallest element. Now notice that 1 occurs twice in the list and index() method only returns the the first index found in the list. So it returns the smallest index of the two index positions of 1 i.e 2. Hence the output is 2.
The test program is given below:
lst=list()
num=int(input("Enter the list size: "))
print("Enter a list of numbers: ")
for i in range(int(num)):
integers=int(input(""))
lst.append(integers)
print("The index of the smallest element is: ")
print(indexOfSmallestElement(lst))
First the list named lst is created. After that the user is prompted to enter the size of the list which determines how many elements user wants to add to the list. num holds the size input by user. After that print statement displays the line"Enter a list of numbers: ". Next the for loop takes the integers from user num times. Suppose user want to enter 3 as list size then loop will take 3 elements from user. int(input("")) in this statement integer type input is taken from user using input() method. lst.append(integers) statement is used to append these input integers into the list i.e. lst. print(indexOfSmallestElement(lst)) the statement calls the indexOfSmallestElement by passing lst to this method to return the index of the smallest element in the list of integers.
Problem You Need to Solve for This Lab:
You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should save the data back to the same data file when the program exits.
What Your Program Should Do:
Write an interactive text based menu interface (using a loop) that will allow the user to
ï‚· Enter information for a new song
ï‚· Display information for all the songs in the database with index for each song
ï‚· Remove a song by index
ï‚· Search for songs by a certain artist
ï‚· Search for songs by a certain album
ï‚· Quit
For each song, you need to keep track of:
title
artist
duration
album
Allow the program to keep looping until user wants to quit. When the program starts, it should load the tasks from external file ("songs.txt") into memory. When user enters information about the new song, the program needs to read them in, save them in memory and eventually write them to the external data file ("songs.txt"). The file format could look like:
Stereo Hearts;Gym Class Heroes;3;34;The Papercut Chronicles II
Counting Stars;OneRepulic;4;17;Native
The ';' is used as a delimiter or field separator. Each record ends with a new line character.
Some Implementation Requirements:
Write at least four functions WITH arguments for this assignment.
Use struct named Song to model each song
Use array of structs to model the collection of songs.
Hint: In this assignment, some data fields may have multiple words in it. Therefore,
you now SHOULD read using the 3 argument version of get.
Watch out. When using the 3 argument version of get you need to make sure to
remove the delimiter or newline. Therefore, anytime you read (even a confirmation
message), make sure to eat the newline using cin.ignore(...)!
Make sure to have a delimiter written between each item in the file – like a newline.
This will be important when you read the information back from the file.
For submission, your data file should contain a sufficient set of test data. It should have test cases for same artist with multiple songs and same album with multiple songs in it.
Do-Not List:
No Global Variables (you can have global constants)
Do not use Classes or Linked Lists
You must use cstring and char arrays. (do not use )
No use of the stdio library (use iostream and fstream)
Instead of the string class, you will be using arrays of characters and the cstring library
No STL containers such as vector. You must implement your own array for this class.
Answer:
Write questions properly
Explanation:
Then it is easy to say answer
You are in a rectangular maze organized in the form of M N cells/locations. You are starting at the upper left corner (grid location: (1; 1)) and you want to go to the lower right corner (grid location: (M;N)). From any location, you can move either to the right or to the bottom, or go diagonal. I.e., from (i; j) you can move to (i; j + 1) or (i + 1; j) or to (i+1; j +1). Cost of moving right or down is 2, while the cost of moving diagonally is 3. The grid has several cells that contain diamonds of whose value lies between 1 and 10. I.e, if you land in such cells you earn an amount that is equal to the value of the diamond in the cell. Your objective is to go from the start corner to the destination corner. Your prot along a path is the total value of the diamonds you picked minus the sum of the all the costs incurred along the path. Your goal is to nd a path that maximizes the prot. Write a dynamic programming algorithm to address the problem. Your algorithm must take a 2-d array representing the maze as input and outputs the maximum possible prot. Your algorithm need not output the path that gives the maximum possible prot. First write the recurrence relation to capture the maximum prot, explain the correctness of the recurrence relation. Design an algorithm based on the recurrence relation. State and derive the time bound of the algorithm. Your algorithm should not use recursion
Answer:
Following are the description of the given points:
Explanation:
A) The Multiple greedy approaches could exist, which could be to reach for the closest emergency diamond, and yet clearly we are going to miss some very essential routes in that case. So, it can make every argument quickly, and seek to demonstrate a reference case for that.
B) An approach to the evolutionary algorithm and its users are going to just have states M x N. But each state (i, j) indicates the absolute difference between the amount of the selected diamond and the amounts of the costs incurred.
DP(i, j) = DimondVal(i, j) + max ((DP(i, j-1)-2), (DP(i-1,j-1)-3))
DP(i, j) is a description of the state.
DimondVal(i, j) is the diamond value at (i j), 0 if there is no diamond available.
This states must calculate the states of M N and it involves continuous-time for each State to determine. Therefore the amount of time of such an algo is going to be O(MN).
#Write a function called random_marks. random_marks should #take three parameters, all integers. It should return a #string. # #The first parameter represents how many apostrophes should #be in the string. The second parameter represents how many #quotation marks should be in the string. The third #parameter represents how many apostrophe-quotation mark #pairs should be in the string. # #For example, random_marks(3, 2, 3) would return this #string: #'''""'"'"'" # #Note that there are three apostrophes, then two quotation #marks, then three '" pairs. #Add your function here!
Answer:
def random_marks(apostrophe, quotation, apostrophe_quotation):
return "'"*apostrophe + "\""*quotation + "'\""*apostrophe_quotation
print(random_marks(3, 2, 3))
Explanation:
Create a function called random_marks that takes apostrophe, quotation, and apostrophe_quotation as parameters. Inside the function, return apostrophe sign times apostrophe plus quotation mark times quotation plus apostrophe sign quotation mark times apostrophe_quotation.
Note that plus sign (+) is used to concatenate strings. Also, if you multiply a string with a number, you get that number of strings ("#"*3 gives ###).
Then, call the function with given parameters and print
Write down the information for your system’s active network connection (most likely either Ethernet or Wi-Fi).
Question:
1. Open a command prompt window, type ipconfig/ all and press Enter.
2. Write down the information for your system’s active network connection(most likely either Ethernet or Wi-Fi).
* Physical address in paired hexadecimal form.
* Physical address expressed in binary form.
Answer:
00000000 11111111 00000011 10111110 10001100 11011010
Explanation:
(i)First, open a command prompt window by using the shortcut: Windows key + X then select command prompt in the list.
(ii)Now type ipconfig/ all and press Enter. This will return a few information
(a) To get the Physical address in paired hexadecimal form, copy any of the Physical Addresses shown. E.g
00-FF-03-BE-8C-DA
This is the hexadecimal form of the physical address.
(b) Now let's convert the physical address into its binary form as follows;
To convert to binary from hexadecimal, we can use the following table;
Hex | Decimal | Binary
0 | 0 | 0000
1 | 1 | 0001
2 | 2 | 0010
3 | 3 | 0011
4 | 4 | 0100
5 | 5 | 0101
6 | 6 | 0110
7 | 7 | 0111
8 | 8 | 1000
9 | 9 | 1001
A | 10 | 1010
B | 11 | 1011
C | 12 | 1100
D | 13 | 1101
E | 14 | 1110
F | 15 | 1111
Now, from the table;
0 = 0000
0 = 0000
F = 1111
F = 1111
0 = 0000
3 = 0011
B = 1011
E = 1110
8 = 1000
C = 1100
D = 1101
A = 1010
Put together, 00-FF-03-BE-8C-DA becomes;
00000000 11111111 00000011 10111110 10001100 11011010
PS: Please make sure there is a space between ipconfig/ and all
Write code to create a list of numbers from 0 to 67 and assign that list to the variable nums. Do not hard code the list. Save & RunLoad HistoryShow CodeLens
Answer:
The program written in Python is as follows
nums = []
for i in range(0,68):
-->nums.append(i)
print(nums)
Explanation:
Please note that --> is used to denote indentation
The first line creates an empty list
nums = []
This line creates an iteration from 0 to 67, using iterating variable i
for i in range(0,68):
This line saves the current value of variable i into the empty list
nums.append(i)
At this point, the list has been completely filled with 0 to 67
This line prints the list
print(nums)
What is the difference between requirements and controls in the security process? Give examples of each.
Answer:
Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.
Explanation:
Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.
Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.
The terminal window wants to evaluate your current bash knowledge by using the ~/workspace/nested-directories folder:
a. cd into the nested-directories/nested-level-1/ directory by using an absolute path
b. cd into the nested-level-3/ directory by using a relative path
d. Move the entire ~/workspace/config/ directory to the nested-level-1/ directory
Answer:
a. cd into the nested directories/ nested - level - 1 / directory using an absolute path
Explanation:
The directory is a location on the hard disk, which is also called a folder. It contains the files and also contains the other directories called sub directories.
A path to a file is merged with a slash and determines the file or directory in the operating system. An absolute path is the location file or directory from the actual file system
The directory's absolute path starts with a slash, and all slashed in the directory separates the directions.
All directions in the absolute path are written on the left side. The last name in the path may belong to the file, and the pwd command can determine the current directory.
The relative path is the location of the file. It begins with the working directory. An absolute path is unambiguous and working with deeply nested directories.
There are two commands which are used such as
cd pwdcd is used for changing directorypwd is used for the working directoryWe easily navigate the file system with the help of an absolute path.
In e-mail, SSL/TLS provides ________. link encryption end-to-end encryption both link encryption and end-to-end encryption neither link encryption nor end-to-end encryption
Answer:
link encryption
Explanation:
In e-mail, SSL/TLS provides link encryption.
The SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.
In the case of a TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.
This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.
Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.Sample program:#include const double GAS_CONST = 8.3144621;int main(void) { double gasPressure = 0.0; double gasMoles = 0.0; double gasTemperature = 0.0; double gasVolume = 0.0; gasPressure = 100; gasMoles = 1 ; gasTemperature = 273; gasVolume = ComputeGasVolume(gasPressure, gasTemperature, gasMoles); printf("Gas volume: %lf m^3\n", gasVolume); return 0;}
Answer:
double ComputeGasVolume(double pressure, double temperature, double moles){
double volume = moles*GAS_CONST*temperature/pressure;
return volume;
}
Explanation:
You may insert this function just before your main function.
Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles
Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.
How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = futureValue * (1 + monthlyInterestRate); i = i+1; }
a. 5
b. 4
c. 6
d. 0
Answer:
I believe it is A
Explanation:
Modify the DemoSalesperson application so each Salesperson has a successive ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive Salesperson. Save the file as DemoSalesperson2.java.
Answer:
Here is the modified DemoSalesperson2
public class DemoSalesperson2{ // class DemoSalesperson2
public static void main(String[] args) { //start of main() function body
SalesPerson[] sp = new SalesPerson[10]; // creates an array of SalesPerson object named sp
int start_id =111; // assign 111 to starting id number
double start_sal=25000; //assign 25000 to starting salary means salary will start from amount 25000
for (int i =0; i<sp.length; i++) { //loop iterates until the value of loop variable i remains less then length of the array object sp
sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i)); /*at each iteration ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive is displayed using object array sp[] which calls the SalesPerson constructor to access id and sales */
System.out.println(sp[i].getId()+" "+sp[i].getAnnualSales() ); } } } /*uses object sp of class SalesPerson to access the methods getId which returns the id and getAnnualSales method which returns the annual sales, to display id and annual sales */
Explanation:
The question first requires a SalesPerson class with these requisites:
Class name: Salesperson.
Data fields for Salesperson: int ID number , double annual sales amount.
Methods: constructor SalesPerson() that requires values for both data fields, as well as get and set methods for each of the data fields.
So according to the complete question's requirement, I have implemented SalesPerson class:
public class SalesPerson { // class name
//data members: integer type id variable and double type sales variable
private int id;
private double sales;
public SalesPerson(int id_no, double annual_sales) { //constructor that requires values for id and sales
id = id_no;
sales = annual_sales; }
public int getId() { //accessor getId() method to get or access the value of id data field
return id; }
public void setId(int id_no) { //mutator setId to set the value of id data field
id = id_no; }
public double getAnnualSales() { //accessor getAnnualSales() method to get or access the value of sales data field
return sales; }
public void setAnnualSales(double annual_sales) { //mutator setAnnualSales to set the value of sales data field
sales = annual_sales; } }
However you can use my DemoSalesperson2 application for your own SalesPerson class.
Now I will explain the working of for loop used in DemoSalesperson2
Iteration 1:
i=0
i<sp.length is true because length of sp[] is 10 so i<10
This means the body of for loop will execute.
The statement inside the body of for loop is :
sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));
class SalesPerson constructor is used to access the data members of SalesPerson class
start_id = 111
start_sal=25000
start_id+i = 111 + 0 = 111
start_sal+5000*(i) = 25000 + 5000 (0) = 25000
The values 111 and 25000 are stored to sp[0] means at the first index of the sp array.
System.out.println(sp[i].getId()+" "+sp[i].getAnnualSales() );
This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.
So the output at 1st iteration is:
111 25000.0
Iteration 1:
The value of i is incremented to 1 so now i = 1
i<sp.length is true because length of sp[] is 10 so i<10
This means the body of for loop will execute.
The statement inside the body of for loop is :
sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));
class SalesPerson constructor is used to access the data members of SalesPerson class
start_id = 111
start_sal=25000
start_id+i = 111 + 1 = 112
start_sal+5000*(i) = 25000 + 5000 (1) = 25000 + 5000 = 30000
The values 111 and 25000 are stored to sp[1] means at the first index of the sp array.
System.out.println(sp[i].getId()+" "+sp[i].getAnnualSales() );
This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.
So the output at 1st iteration is:
112 30000.0
The loop keeps iterating and the value of id is incremented by 1 and value of sales is increased by 5000 at every iteration.
This loop continues to execute until the value of i exceeds the length of sp array i.e. 10.
The values from iteration 1 to 8 following the above explanation are:
Iteration 1:
111 25000.0
Iteration 2:
112 30000.0
Iteration 3:
113 35000.0
Iteration 4:
114 40000.0
Iteration 5:
115 45000.0
Iteration 6:
116 50000.0
Iteration 7:
117 55000.0
Iteration 8:
118 60000.0
Iteration 9:
119 65000.0
Iteration 10:
120 70000.0
At iteration 11 the for loop body will not execute as value of i at 11th iteration is i = 10 and i<sp.length evaluates to false as i = sp.length because length of sp array is 10 and now the value of i is also 10. So the loop ends. Screenshot of the program and its output is attached.
12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE function to find the average bonus multiplier (C7:C10).
Answer:
1. Divide each bonus by regular bonus apply this to all the data
2. In cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.
Explanation:
The average bonus multiplier can be found by dividing each bonus with the regular bonus applying this to all the data and then putting the average formula and applying it to the cells C7:C10.
After dividing the bonus with regular bonus, in cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.
The advantage of returning a structure type from a function when compared to returning a fundamental type is that
Answer:
The function can return multiple values and the function can return an object
Explanation:
The advantage of returning a structure type from a function when compared to returning a fundamental type is that the function can return multiple values and also the function can return an object
A function in a structure can be passed to a function from any other function or from the main function itself and the definition of a structure can be seen in the function where it is found
What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation?
Answer:
Linked lists and arrays are both linear data structures but while an array is a collection of items that can be accessed randomly, a linked list can be accessed sequentially.
A sparse matrix contains very few non-zero elements. For example;
_ _
| 0 0 3 0 6 |
| 0 5 0 0 4 |
| 2 0 0 0 0 |
|_ 0 0 0 0 0 _|
In the implementation of a sparse matrix, the following are some of the pros and cons of using a linked list over an array;
PROS
i. Linked lists are dynamic in nature and are readily flexible - they can expand and contract without having to allocate and/or de-allocated memory compared to an array where an initial size might need to be set and controlled almost manually. This makes it easy to store and remove elements from the sparse matrix.
ii. No memory wastage. Since the size of a linked list can grow or shrink at run time, there's no memory wastage as it adjusts depending on the number of items it wants to store. This is in contrast with arrays where you might have unallocated slots. Also, because the zeros of the sparse matrix need not be stored when using linked lists, memory is greatly conserved.
CONS
i. One of the biggest cons of linked lists is the difficulty in traversing items. With arrays, this is just of an order of 0(1) since the only requirement is the index of the item. With linked lists, traversal is sequential which means slow access time.
ii. Storage is another bottle neck when using linked lists in sparse matrix implementation. Each node item in a linked list contains other information that needs to be stored alongside the value such as the pointer to the next or previous item.
The main path of the Internet along which data travels the fastest is known as the Internet ________. Group of answer choices
Answer:
Internet backbone
Explanation:
The internet backbone is made up of multiple networks from multiple users. It is the central data route between interconnected computer networks and core routers of the Internet on the large scale. This backbone does not have a unique central control or policies, and is hosted by big government, research and academic institutes, commercial organisations etc. Although it is governed by the principle of settlement-free peering, in which providers privately negotiate interconnection agreements, moves have been made to ensure that no particular internet backbone provider grows too large as to dominate the backbone market.
What's the value of this Python expression? ((10 >= 5*2) and (10 <= 5*2))
Answer:
The Boolean value returned by that expression will be True
Explanation:
We have two logical statements in that expression:
Expression 1: (10 >= 5*2)
This can be read as: is 10 greater than or equal to 5 multipled by 2. This evaluates to true as 10 is equal to 5 * 2. Hence expression 1 returns true
Expression 2: (10 <= 5*2)
This can be read as: is 10 less than or equal to 5 multiplied by 2. This also evaluates to true as 10 is equal to 5*2. Hence expression 2 returns true.
Now between this two expression is the and operator which evaluates to true if and only if both logical expressions returnes true.
True and True ==> True
Since Expression 1 ==> True and Expression 2 ==> True
This means Expression 1 and Expression 2 ==> True which is the Boolean value returned by the statement
The value of the python expression ((10 >= 5*2) and (10 <= 5*2)) is True
The code will definitely return a Boolean value(True or False).
For the expression to be True , the two statements must be True. The AND gate returns True if the whole statement is True.
(10 >= 5*2) is True because 10 is equals to 5 × 2 = 10.
(10 <= 5*2) is True because 10 is equals to 5 × 2 = 10.
The two statements are True . Therefore,
True and True = True.
learn more on python code; https://brainly.com/question/17013562?referrer=searchResults
When preparing a photo for a magazine, a graphic designer would most likely need to use a program such as Microsoft Excel to keep track of magazine sales. Microsoft Word to write an article about the photo. Adobe Photoshop to manipulate the photo. Autodesk Maya to create 3-D images that match the photo.
Answer:
Adobe Photoshop To Manipulate The Photo.
Explanation:
BLACKPINKS new album is amazing OMG I LOVE Lovesick Girls!!!
Your smartphone, digital camera, and printer are all part of a network in your workspace. What type of network is likely in use
Answer:
PAN
Explanation:
PAN, short form of Personal Area Network, is a type of computer network built for personal use typically within a building. This could be inside a small office or a bedroom in a residence. This type of network basically consists of one or more personal computers, digital camera, printer, Tv, scanner, telephones, peripheral devices, video games console, and other similar devices.
It is pretty much simple to set up and allow for great flexibility. In this network, a single modem can be set up to enable both wired and wireless connections for multiple devices within the building.
A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.) A. LCD power inverter B. AC adapter C. Battery D. Processor E. VGA card F. Motherboard G. Backlit keyboard H. Wireless antenna
Answer:
A. LCD power inverter
B. AC adapter
C. Battery